Cybersecurity Session Schedule
9:00AM-10:00AM
Room PLN-130
KEYNOTE - KEITH W. MCINTOSH
Topic: Inclusive Leadership in Action
Keith W. McIntosh is the vice president for Information Services and Chief Information Officer (CIO) at the University of Richmond
10:30am-10:50am
Room PLS-240
Data Privacy in Higher Education 101
Catherine Barrad, University Counsel
This presentation provides an overview of data privacy as it applies to the university setting, and what that means for students, faculty and staff.
11:00am-11:20am
Room PLS-240
Records Management - Retention
John Beisner, Executive Director Risk Management
Anne Grogan, Confidential Administrative Assistant Risk Management
Understand Records Retention and guidance regarding each type of record.
11:30am-11:50am
Room PLS-240
Records Management - Records Request
John Beisner, Executive Director Risk Management
Anne Grogan, Confidential Administrative Assistant Risk Management
Need Records? Learn how to request Records and discuss legally-prescribed deadlines.
12:00pm-01:00pm
Room PLN-130
KEYNOTE - JESSE GOLDHAMMER
Topic: Cybersecurity
Sponsored by Deloitte. Lunch provided!
Jesse Goldhammer is a Managing Director in Deloitte’s Cyber & Strategic Risk practice. He has deep experience in cybersecurity, strategy, innovation, scenario planning, and workforce training.
1:00pm-01:20pm
Room PLS-240
Women in Cybersecurity
Carol Gonzales, AVP for IT Secuirty & Compliance/CISO
Cuc Du, CISM, CISSP Information Security Officer CSULB
Discover the academic and career journeys of two distinguished women in the cybersecurity field.
1:30pm-01:50pm
Room PLS-240
Enhancing Email Security
Pablo Revilla, Proofpoint
Claudia Quick, Proofpoint
Emails continue to be cyber-criminals' vector of choice for distributing malware and phishing attacks. Come and learn how Proofpoint protects against these threats and how you can do your part.
2:00pm-02:20pm
Room PLS-240
Threat Intelligence Briefing
Brad Weinstein, Sales Engineer at CrowdStrike
This session will cover how attacks have trended over the last year; which adversaries are perpetuating these attacks and what can be done to mitigate and prevent future attacks